Login / Signup
A Graph-based Methodology for Analyzing IP Spoofing Attack.
Voravud Santiraveewan
Yongyuth Permpoontanalarp
Published in:
AINA (2) (2004)
Keyphrases
</>
design methodology
information systems
semi supervised
ddos attacks
database
image segmentation
countermeasures
application layer